The launch of the 'next' round of new generic top-level domain (gTLDs) program has experienced significant delays since the 2012 round, resulting in frustration for prospective applicants and undermined trust in the multistakeholder governance model. more
The Hive Ransomware Group has had more than 1,500 victims across more than 80 countries worldwide. They attacked hospitals, school districts, financial firms, and critical infrastructure until the U.S. Department of Justice (DOJ) disrupted their operations. Have we seen the fall of the group's entire infrastructure? more
Radix, the operator of top-level domains .Store, .Online, .Tech, .Website, .Space, .Press, .Site, .Host, .Fun and .Uno, has earned a reputation as one of the most innovative and effective marketers in the domain industry. Today the company shared results from a 3-month creators.store campaign they launched in November that provided further proof of that. more
Here are a few observations on the state of the IPv4 marketplace during 2022. All the statistics here exclude transfers of IPv4 addresses involved in mergers and acquisitions. more
Targeting governments the world over in cyber attacks is not a novel concept. Doing that using mobile apps, however, is quite new as a tactic. And that's what Cyble researchers reported as Gigabud RAT's modus operandi - trailing its sights on citizens of Thailand, the Philippines, and Peru who use government-owned institutions' mobile apps. more
In November 2022, eco's topDNS Initiative invited about 30 experts, including representatives of three different Directorate Generals by the EU Commission, to a workshop in Brussels to work together on a secure future for the DNS (Domain Name System). The topDNS Initiative has now published its 28-page final report. more
Putting on a mask on malware has always worked to trick users into downloading them, and the threat actors behind Batloader banked on just that. Trend Micro researchers tracked and analyzed Batloader-related developments toward the end of 2022. more
Taking control of victims' accounts is typically the end goal of many cybercriminals, and they never cease to come up with wily ways to do so. Bleeping Computer researchers recently spotted hackers spreading malware mayhem through Google search ads supposedly pointing to open-source software download sites. more
AutoIT-compiled malware and Dridex trace their roots to as far back as 2008 and 2014, respectively. As malware variants go, therefore, they've both had a long history and taken on various forms over time. But despite having been detected and consequently blocked with each new version, they're still alive and kicking -- a testament to their persistence. more
Over a decade has passed since ICANN's last new gTLD application round, with many companies in the industry commemorating their 10th anniversaries. Of these, Radix has been particularly active in celebrating its own milestone, and recently, Kevin Murphy of Domain Incite sat down with CEO Sandeep Ramchandani to discuss the past decade and what the future may hold. more
Threat actors have been targeting Zoom and its users since the platform's launch, and it's easy to see why -- the latest stats show it accounts for 3.3 trillion annual meeting minutes worldwide. It's not surprising, therefore, that cyber attackers trailed their sights yet again on the communication app. more
Cyber espionage group Cloud Atlas has been trailing its sights on critical infrastructure operators in countries suffering from political conflict since its discovery in 2014. Aptly nicknamed "Inception," the group's tactic of going after nations with bigger problems than cybersecurity seems to be working, as evidenced by successful intrusions over the years. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com